Cross-site Scripting (XSS) Affecting org.webjars.bower:plotly.js package, versions [1.10.4,1.16.0)


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Mature

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Cross-site Scripting (XSS) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JAVA-ORGWEBJARSBOWER-480089
  • published17 Oct 2016
  • disclosed9 Aug 2016
  • creditJared Folkins

Introduced: 9 Aug 2016

CVE NOT AVAILABLE CWE-79  (opens in a new tab)

How to fix?

Upgrade to plotly.js version 1.16.0 or newer.

Overview

plotly.js is a high-level, declarative charting library.

Affected versions of the package allow attackers to trick an unsuspecting user into viewing a specially crafted plot on a site that uses plotly.js. The vulnerability would have allowed the attacker to retrieve authentication tokens and perform actions on behalf of the user.

plot.ly is rendering SVG objects inside the DOM. href tags are converted to the xlink:href attriubute on the <a> tag. This allowed an attacker to break out into the DOM and inject a payload.

For more information, see Jared's post explaining the issue very well.

Details

<>

CVSS Scores

version 3.1